Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21695: CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes in kromitgmbh titra

0
Medium
VulnerabilityCVE-2026-21695cvecve-2026-21695cwe-915
Published: Wed Jan 07 2026 (01/07/2026, 23:19:01 UTC)
Source: CVE Database V5
Vendor/Project: kromitgmbh
Product: titra

Description

Titra is open source project time tracking software. In versions 0.99.49 and below, an API has a Mass Assignment vulnerability which allows authenticated users to inject arbitrary fields into time entries, bypassing business logic controls via the customfields parameter. The affected endpoint uses the JavaScript spread operator (...customfields) to merge user-controlled input directly into the database document. While customfields is validated as an Object type, there is no validation of which keys are permitted inside that object. This allows attackers to overwrite protected fields such as userId, hours, and state. The issue is fixed in version 0.99.50.

AI-Powered Analysis

AILast updated: 01/15/2026, 04:38:48 UTC

Technical Analysis

CVE-2026-21695 is a Mass Assignment vulnerability identified in the open-source project time tracking software Titra, specifically in versions prior to 0.99.50. The vulnerability stems from improper control over dynamically-determined object attributes (CWE-915) within an API endpoint that accepts a customfields parameter. This parameter is expected to be an Object, and while its type is validated, the keys within the object are not restricted or validated. The API uses the JavaScript spread operator to merge the customfields object directly into the database document representing a time entry. Because of this, an authenticated attacker can inject arbitrary fields, including protected fields such as userId, hours, and state, effectively bypassing business logic controls designed to prevent unauthorized modifications. This can allow attackers to manipulate time tracking records, potentially altering hours logged or ownership of entries. The vulnerability requires the attacker to be authenticated but does not require additional user interaction. The CVSS v3.1 score is 4.3 (medium severity), reflecting the limited impact on confidentiality and availability but a notable impact on data integrity. No known exploits are reported in the wild as of the publication date. The vulnerability is resolved in Titra version 0.99.50 by implementing proper validation and restriction of keys allowed within the customfields object before merging.

Potential Impact

For European organizations using Titra versions below 0.99.50, this vulnerability poses a risk to the integrity of time tracking data. Attackers with valid credentials can manipulate critical fields such as userId and hours, potentially leading to fraudulent time reporting, payroll errors, or unauthorized access to resources tied to time entries. This can undermine trust in internal controls and compliance with labor regulations. While confidentiality and availability are not directly impacted, the integrity compromise can have financial and operational consequences. Organizations relying on Titra for billing, project management, or workforce tracking may experience data corruption or manipulation, affecting audits and reporting accuracy. The requirement for authentication limits exposure to insider threats or compromised accounts but does not eliminate risk. Given the open-source nature of Titra, organizations customizing or self-hosting the software may be particularly vulnerable if patches are not applied promptly.

Mitigation Recommendations

European organizations should immediately upgrade Titra installations to version 0.99.50 or later, where the vulnerability is fixed. Until upgrading is possible, implement strict server-side validation to whitelist allowed keys within the customfields parameter, rejecting any unexpected or protected fields. Employ role-based access controls to limit which authenticated users can modify time entries and monitor logs for unusual changes to critical fields such as userId, hours, and state. Conduct regular audits of time tracking data to detect anomalies indicative of exploitation. Additionally, enforce strong authentication mechanisms and monitor for compromised credentials to reduce the risk of insider or external attackers gaining access. If feasible, isolate Titra instances within secure network segments and apply application-layer firewalls to detect and block suspicious API requests. Finally, educate users and administrators about the importance of timely patching and secure configuration management for open-source software.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-02T18:45:27.397Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695eeee107b8a419a7712f38

Added to database: 1/7/2026, 11:40:17 PM

Last enriched: 1/15/2026, 4:38:48 AM

Last updated: 2/7/2026, 3:52:48 AM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats